Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious website blocking method and device in multi-core browser

A technology of malicious websites and nuclear browsers, which is applied in the direction of electrical components, transmission systems, special data processing applications, etc., can solve the problem that malicious websites cannot be intercepted, and achieve the effect of timely and effective interception

Active Publication Date: 2019-05-24
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the interception of malicious URLs in the browser depends entirely on third-party devices, when the terminal is not installed with a third-party device or the third-party device is not activated on the terminal, the malicious URLs accessed in the browser cannot be intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious website blocking method and device in multi-core browser
  • Malicious website blocking method and device in multi-core browser
  • Malicious website blocking method and device in multi-core browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0046] see figure 1 , shows a structural diagram of a multi-core browser for intercepting malicious URLs according to an embodiment of the present invention. The multi-core browser includes: a URL information acquisition module 110 , a kernel judgment module 120 , a malicious website judgment module 130 and a malicious website access interception module 140 .

[0047] The URL information acquiring module 110 is adapted to acquire ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an interception method and device of malicious uniform resource locators in a multi-core browser, wherein the device comprises a URL information obtaining module, a core judging module, a malicious uniform resource locator judging module and a malicious uniform resource locator access interception module. The core judging module is suitable for judging the cores rendering loading web pages according to URL information and initiates a request to the malicious uniform resource locator judging module for judging whether uniform resource locators are the malicious uniform resource locators or not after judgment is finished. The malicious uniform resource locator access interception module is also suitable for downloading an updated black list or an updated white list through a uniform resource locator security judging server and updating a local black list or a local white list by using the downloaded black list or white list. According to the method and the device, the problem of incapability of intercepting the malicious uniform resource locators accessing the browser when a terminal is not equipped with a third party device or the third party device is not started at the terminal is solved, and the beneficial effect of timely and effectively intercepting the malicious uniform resource locators is realized.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a method and device for intercepting malicious website addresses in a multi-core browser. Background technique [0002] A multi-core browser refers to a browser including more than two cores, such as a dual-core browser used in the prior art. In the prior art, due to the high penetration rate of the IE browser, most online banks and payment systems only support the Trident kernel of IE, and other browsers cannot be used for online transactions such as normal payment and transfer. However, non-IE browsers using cores such as WebKit kernel and chrome kernel in the prior art have more and more users because of their higher performance and better rendering effects. Thus, multi-core browsers have been produced in the prior art. When accessing general websites that do not need online transactions, use the faster WebKit kernel or chrome kernel to access, which is "high-speed mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCG06F16/9566H04L63/0236H04L63/1466H04L63/1483H04L67/02
Inventor 蔡永建王志刚任寰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products